The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to MacOS and Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninstall script is executed with elevated privileges (e.g., via sudo) in an environment where $PATH has been manipulated, an attacker with root/sudo privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges.
Advisories

No advisories yet.

Fixes

Solution

Customers are advised to update to non-affected versions of Qualys product.


Workaround

Customers are advised to check workaround solutions listed onĀ  https://www.qualys.com/security-advisories/cve-2025-43079

History

Mon, 10 Nov 2025 19:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'total'}, 'version': '2.0.3'}


Mon, 10 Nov 2025 17:30:00 +0000

Type Values Removed Values Added
Description The Qualys Cloud Agent included a bundled uninstall script (qagent_uninstall.sh), specific to MacOS and Linux supported versions that invoked multiple system commands without using absolute paths and without sanitizing the $PATH environment. If the uninstall script is executed with elevated privileges (e.g., via sudo) in an environment where $PATH has been manipulated, an attacker with root/sudo privileges could cause malicious executables to be run in place of the intended system binaries. This behavior can be leveraged for local privilege escalation and arbitrary command execution under elevated privileges.
Title Local Privilege Escalation via qagent_uninstall.sh Qualys Cloud Agents
Weaknesses CWE-732
References
Metrics cvssV3_1

{'score': 6.3, 'vector': 'CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H'}


cve-icon MITRE

Status: PUBLISHED

Assigner: Qualys

Published:

Updated: 2025-11-10T18:37:16.044Z

Reserved: 2025-04-16T14:43:29.660Z

Link: CVE-2025-43079

cve-icon Vulnrichment

Updated: 2025-11-10T18:37:08.243Z

cve-icon NVD

Status : Received

Published: 2025-11-10T18:16:06.420

Modified: 2025-11-10T18:16:06.420

Link: CVE-2025-43079

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.